Red Hat Product Security has been made aware of a critical vulnerability in the glibc library, which has been assigned CVE-2015-0235 and is commonly referred to as 'GHOST'. All versions of glibc shipped with all variants of Red Hat Enterprise Linux are affected.
GHOST is a 'buffer overflow' bug affecting the
gethostbyname2() function calls in the glibc library. This vulnerability allows a remote attacker that is able to make an application call to either of these functions to execute arbitrary code with the permissions of the user running the application.
For more information, follow the link below:
iDashboards cloud.idashboards.com Users
You may continue to use our website cloud.idashboards.com for online access to your accounts without concern.
iDashboards Private Cloud Users
You may continue to use our website for online access to your accounts without concern.
iDashboards Enterprise, X Platform and Enterprise Suite Users
iDashboards can be installed on any operating system that supports a Java Application server, usually Windows, Unix or Linux. Please read the above article from Redhat if your iDashboards installation is running on Linux. If your installation is on Windows or Unix then you do not need to address the GHOST vulnerability.
**Please note that any installations of iDashboards running in Windows environments are not affected by this issue.**
The iDashboards OSKAR support portal is hosted by our provider, Zendesk.com. iDashboards is not aware of Zendesk.com being affected by the vulnerability. You may continue to use OSKAR for online access to your accounts without concern.
The iDashboards Support Team